Examining Your Network and Its Security Needs

According to the National Security Agency (NSA), attacks to systems connected to the Internet are becoming more complex and dangerous. For instance, hackers can penetrate computer systems, using a variety of techniques to exploit weaknesses hidden in the complex code of many operating systems and applications.

What to Protect and Why

Internet-facing servers are accessible to people anywhere in the world who have Internet access, and these servers are often targets of attacks. They include web servers, email servers, File Transfer Protocol (FTP) servers, and more. If a server has a public IP address, it is a potential target for hacker attack. Firewalls also protect internal clients by providing a layer of protection to limit the ability of attackers to exploit system weaknesses—both hardware and software.

Imagine an organization that sells products over the Internet and processes payment card transactions. Customers insist that the merchant protect their payment card data. To do this, organizations need to address two distinct security areas:

  • Network security—Computers, hard disks, databases, and other computer equipment attached directly or indirectly to the Internet need protection. Firewalls serve an important role in this aspect of network security.
  • Transaction security—Web servers must be able to securely complete private transactions with other entities in databases accessible on the Internet. Hypertext Transfer Protocol Secure (HTTPS) is an important tool used to encrypt the transactions. Additionally, firewalls provide protection for the data. For example, it is common to locate a web server behind one firewall. The database server is behind a second firewall that restricts access to the database to only the web server. In this scenario, the area where the web server operates is called a demilitarized zone (DMZ).

Network security and transaction security have four overlapping types of risk:

  • Unauthorized individuals can breach the server’s document tree—Depending on what data resides on the server, this threat can compromise the confidentiality of documents stored there.
  • Transaction data can be intercepted—This threat can include personal data, financial data, or payment card information.
  • Information about the server can be accessed—If attackers learn details about the server, such as the type of server and its operating system (OS), they may be able to identify and exploit its known vulnerabilities.
  • Denial of service (DoS) attacks can occur—Many different types of DoS attacks are possible, such as when a TCP handshake attack does not conclude and holds the communication channel open. Hundreds of these incomplete sessions in a short time can consume substantial resources on a server and even crash it.

If your organization conducts business on the Internet, you need to take steps to protect those transactions. E-commerce requires a zero tolerance for failure. Protection is not optional; it is required.

Protecting Information and Resources

An organization must protect against attackers trying to access information and resources within the internal network, such as servers and workstations. Servers can host massive amounts of data invaluable to attackers. Database servers may host personally identifiable information (PII) about customers, including their payment card data. Domain Name System (DNS) servers host information such as the IP addresses and names of all systems in the network.

Protecting Clients and Users

Most organizations have a written security policy that outlines specific security requirements. A firewall can be useful in upholding the security policy by providing perimeter security. In other words, the firewall limits the risk of attack from hackers outside the internal network.

However, if you want to guarantee the security of an organization’s network and protect its clients’ and users’ interests, you should do the following, as well:

  • Treat private messages as confidential—Private messages should be encrypted to ensure that the message remains confidential. Encryption prevents the unauthorized disclosure of the private message.
  • Maintain integrity of information—Integrity methods verify that data has not changed. For example, hashing is often used to verify the integrity of messages. A hash is simply a number calculated by applying an algorithm (a mathematical formula) to the numbers (1s and 0s) that make up a message. No matter how many times you calculate the hash, it will always be the same, as long as the data has not changed. The hash is calculated at the source and sent with the message. The hash is recalculated at the destination against the received message and compared with the hash sent with the message. If both hashes are the same, the integrity of the message is ensured.
  • Use strong authentication and nonrepudiation methods for all transactions—Digital signatures commonly accompany both authentication and nonrepudiation. For example, a sender can sign a message with a digital signature. The receiver can use this signature to verify the identity of the sender. In other words, the digital signature provides authentication. Additionally, because it was digitally signed, the sender cannot deny sending it. In other words, the digital signature also provides nonrepudiation.

Preserving Privacy

It is more difficult to preserve a user’s privacy on the Internet than in the physical world. Usually, you can close your door when seeking privacy or whisper something so that others cannot hear you. But the digital era has changed things. There is no such thing as whispering on the Internet.

When data is sent or received by a user surfing the Internet, that information can be intercepted and collected. Much of this data is stored in databases and can be made available for sale to others. Data mining methods are then used to help build customer preference profiles. From the perspective of an organization selling products, this data is valuable for identifying an individual’s buying habits and targeting advertising. However, this data can be easily misused.

The Electronic Privacy Information Center (EPIC) was established in 1994, in Washington, DC. Its goal is to alert the public to emerging privacy issues relating to the National Information Infrastructure (NII), such as the Digital Telephony Proposal, medical record privacy, and the sale of consumer data. EPIC’s mission is to preserve the right of privacy in the electronic age, as well as to give individuals greater control over personal information and to encourage the development of new technologies that protect privacy rights. EPIC can provide valuable information to IT professionals on emerging cyber laws and other privacy threats.

The California Consumer Privacy Act (CCPA), which went into effect in January 2020, requires companies to protect the consumer information they hold, and it stipulates minimum damages for class action suits in response to data breaches. The requirement to “implement and maintain reasonable security procedures and practices” often includes keeping sensitive information in a database behind a firewall and restricting access to the database.

Preserving privacy on a corporate network may require more stringent security if you have users accessing resources from all over the world. Administrators are responsible for setting up security policies to guarantee users’ privacy, and each user accessing the company’s network is responsible for browsing the web with ethical regard for others. They also should be aware of information they may reveal while accessing resources from outside the network.

Typically, most network servers (and web servers) log all the hits (connections) received. This log usually includes the IP address and/or the host name of the computer making the request. If the site uses any form of authentication, the server will also log the username. If the user filled out any form during the session, all of the values of any variable from that form are also recorded. The status of the request, the size of data packets transmitted, the user’s email address, and so on can also be logged. Moreover, web servers can make all of this information available to Common Gateway Interface (CGI) scripts. Because the majority of web browsers are running on single-user PCs, very likely all of the transactions can be attributed to the individual using the PC.

Technical TIP

If you want to know more about EPIC, you can check out its webpage at https://epic.org/.

Revealing any of this information can harm the user. This is especially true if the user has logged any PII. Attackers can use PII for identity theft. Some PII may allow an attacker to access bank accounts or fraudulently charge payment cards. As a subtler example, if a user researches a job opening opportunity at a site, it may indicate that the user is searching for a new job. Browser lists, hotlists, and caches can also reveal certain patterns about the user. A proxy server, for instance, will track every connection outside the network on the Internet by IP address and the URL requested. If you install a proxy server within an organization, data stored on it needs to be protected so that only authorized individuals have access to it.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.144.97.216